1. [1] R. Rastgar, A. Isazadeh, J. Karimpour, "Flow-based intrusion detection based on traffic distribution graph", In 13th International Conf. on Iranian Cryptography Society, 2016.
2. [2] M. Zabihi, M. Vafaei Jahan, "An optimized accurate algorithm based on Markov clustering for web robots detection", 7th International Conf. on Iranian Operation Research, 2014. [
DOI:10.1109/ICCKE.2014.6993362]
3. [3] S. Anwar, J. M. Zain, M. F. Zolkipli, Z. Inayat, S. Khan, B. Anthony, V. Chang, "From intrusion detection to an intrusion response system: fundamentals, requirements, and future directions", Algorithms, vol. 10(39), 2017. [
DOI:10.3390/a10020039]
4. [4] U.H. Rao, U. Nayak, "Intrusion Detection and Prevention Systems", The InfoSec Handbook. Apress, Berkeley, CA. 2014. [
DOI:10.1007/978-1-4302-6383-8_11]
5. [5] E. Viegas, A. O. Santin, A. Franca, R. Jasinski, V. A. Pedroni and L. S. Oliveira, "Towards an Energy-Efficient Anomaly-Based Intrusion Detection Engine for Embedded Systems"-, IEEE Transactions on Computers, vol. 66 (1), pp. 163-177, 2017. [
DOI:10.1109/TC.2016.2560839]
6. [6] A. Sperotto, "Flow-based intrusion detection", Ph.D. Dissertation, University of Twente, 2010.
7. [7] L. Hellemons, L. Hendriks, R. Hofstede, A. Sperotto, R. Sadre, and A. Pras, "Sshcure: a flow-based ssh intrusion detection system", Dependable Networks and Services, LNCS vol. 7279, pp.86-97, 2012. [
DOI:10.1007/978-3-642-30633-4_11]
8. [8] M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, and G. Varghese, "Network traffic analysis using traffic dispersion graphs (tdgs): techniques and hardware implementation", UCR Technical Report, 2007. [
DOI:10.1145/1298306.1298349]
9. [9] D. Q. Le, T. Jeong, H. E. Roman, and J. W.-K. Hong, "Traffic dispersion graph based anomaly detection", In Proc. of the Second Sym. on Information and Communication Technology, pp.36-41, ACM, 2011.
10. [10] D. Q. Le, T. Jeong, H. E. Roman, and J. W. Hong, "Trafic dispersion graph based anomaly detection", In Proc. of the Second Sym. on Information and Communication Technology, pp. 36-41, ACM, 2011
11. [11] P. Manandhar and Z. Aung, "Towards practical anomaly-based intrusion detection by outlier mining on tcp packets", Database and Expert Systems Applications, LNCS vol. 8645, pp. 164-173, 2014. [
DOI:10.1007/978-3-319-10085-2_14]
12. [12] H. A. Kholidy, F. Baiardi, "CIDD: A Cloud Intrusion Detection Dataset for Cloud Computing and Masquerade Attacks", 9th International Conference on Information Technology - New Generations, Las Vegas, NV, USA, 2012. [
DOI:10.1109/ITNG.2012.97]
13. [13] R. Lippmann, J.W. Haines, D. J. Fried, J. Korba, and K. Das, "The 1999 darpa off-line intrusion detection evaluation", Computer networks, vol. 34(4), pp. 579-595, 2000. [
DOI:10.1016/S1389-1286(00)00139-0]
14. [14] S. M. Dongen, "Graph Clustering by Flow Simulation", PhD Dissertation, University of Utrecht, 2000.
15. [15] G. P. Guptaa, M. Kularivaa, "A Framework for Fast and Efficient Cyber Security Network Intrusion Detection using Apache Spark", 6th Int. Conf. on Advances in Computing & Communications, 2016, 6-8 September 2016. Procedia Computer Science 93, pp. 824 - 831. [
DOI:10.1016/j.procs.2016.07.238]